A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hippocratic Databases
[chapter]
2002
VLDB '02: Proceedings of the 28th International Conference on Very Large Databases
We propose a strawman design for Hippocratic databases, identify the technical challenges and problems in designing such databases, and suggest some approaches that may lead to solutions. ...
Our hope is that this paper will serve to catalyze a fruitful and exciting direction for future database research. ...
Acknowledgment We would like to thank Don Haderle for suggesting that we focus on the principles underlying the current privacy laws and regulations to drive the design of the Hippocratic database. ...
doi:10.1016/b978-155860869-6/50021-4
dblp:conf/vldb/AgrawalKSX02
fatcat:muvxqffmivd4dki56dnpodw2fq
Database security - concepts, approaches, and challenges
2005
IEEE Transactions on Dependable and Secure Computing
We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the ...
role-based access control (RBAC) model. ...
IT, Human, Legal, and Economic Perspectives," by an IBM Fellowship, and by the sponsors of CERIAS. ...
doi:10.1109/tdsc.2005.9
fatcat:6r3s2k2l25cdpgawjmp3rgtfue
Access Control for Databases: Concepts and Systems
2010
Foundations and Trends in Databases
We then briefly discuss issues concerning the application of MAC models to object databases, and we conclude by covering access control models and systems for XML data, for geographical data, and for digital ...
The use of such access control model for databases requires addressing several challenging issues. ...
doi:10.1561/1900000014
fatcat:trrsnypzyvcq5phpgvee7dumva
Database Security: A Historical Perspective
[article]
2010
arXiv
pre-print
Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. ...
Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to ...
While access control for file systems was well established an access control for DBMS did not fit well with that model. ...
arXiv:1004.4022v1
fatcat:qosmugsvkzh4pmaeiqj2ysq3ay
Engineering a Policy-Based System for Federated Healthcare Databases
2007
IEEE Transactions on Knowledge and Data Engineering
of user and environment context in the access control mechanism for personal healthcare information management. ...
Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need ...
Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need ...
doi:10.1109/tkde.2007.1050
fatcat:47r5pichlfct7bpshj53a54y7u
Limiting Disclosure in Hippocratic Databases
[chapter]
2004
Proceedings 2004 VLDB Conference
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced ...
Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to large databases. ...
about choice storage and query modification, and to Ameet Kini and Diana Zhou for their work on the prototype implementation. ...
doi:10.1016/b978-012088469-8/50013-9
fatcat:q5iwycozozhfpm27uwktrzbspm
Limiting Disclosure in Hippocratic Databases
[chapter]
2004
Proceedings 2004 VLDB Conference
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced ...
Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to large databases. ...
about choice storage and query modification, and to Ameet Kini and Diana Zhou for their work on the prototype implementation. ...
doi:10.1016/b978-012088469-8.50013-9
dblp:conf/vldb/LeFevreAERXD04
fatcat:pedywz2marcnzmj2wrf7elx2de
User-Centric Privacy Preservation Solution to Control Third Party Access in Digital Databases
2017
Zenodo
However intelligent algorithms dynamically derive user sensitive database attributes to hide, when controlling third party access. ...
Today, everything is e-enabled and human-linked information is digitally stored in digital databases, files and so on. ...
Hippocratic database model which is designed to relational databases extended into the Hippocratic XML database model [16] . ...
doi:10.5281/zenodo.3951349
fatcat:wtkemiwecngbtewxjpkdxtkume
RFID enabled traceability networks: a survey
2011
Distributed and parallel databases
We propose a set of criteria for analyzing and comparing the current existing techniques including system architectures and data models. ...
As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked RFID system formed by a set of distributed and collaborating parties. ...
Access to ONS records is also controlled by strict access control mechanisms. Discovery Services (DS). ...
doi:10.1007/s10619-011-7084-9
fatcat:liqbc262zjdavbwjtzh3g7tvly
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
2006
22nd International Conference on Data Engineering (ICDE'06)
We suggest that database technology can play an important role in assisting compliance with the internal control provisions of the Act. ...
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. ...
We have also outlined important technical challenges and suggested topics for database research. We hope this work provides the basis for innovations that revolutionize internal control systems. ...
doi:10.1109/icde.2006.155
dblp:conf/icde/AgrawalJKL06
fatcat:mqeefvjgorfnlfi3ltfk4f2sby
Privacy-preserving data integration and sharing
2004
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery - DMKD '04
Integrating data from multiple sources has been a longstanding challenge in the database community. ...
Some of the privacy issues have been addressed for the case of a single database management system in Hippocratic Databases [3] . ...
Database security has generally focused on access control: Users are explicitly (or perhaps implicitly) allowed certain types of access to a data item. ...
doi:10.1145/1008694.1008698
dblp:conf/dmkd/CliftonKDSVES04
fatcat:5zotyfq2ercnrkonhc2hh5rgd4
Download Complete Issue: CP54 (27MB)
2006
Cartographic Perspectives
There is, however, a general ethics that applies to mapmakers . . ." ACKNOWLEDGEMENTS REFERENCES cartographic perspectives ...
The model is medicine's Hippocratic Oath, an ethical statement that has "served as a model for almost a hundred generations" (Nuland, 1988) . ...
in the database). ...
doi:10.14714/cp54.336
fatcat:vrmndbcbqrhkdp6wx6b5iaptgq
Purpose based access control of complex data for privacy protection
2005
Proceedings of the tenth ACM symposium on Access control models and technologies - SACMAT '05
We recently proposed a privacy preserving access control model for relational databases, where purpose information associated with a given data element specifies the intended use of the data element. ...
In this paper, we extend our previous work to handle other advanced data management systems, such as the ones based on XML and the ones based on the object-relational data model. ...
Data Query and Query Compliance Users request an access to data by issuing a query. ...
doi:10.1145/1063979.1063998
dblp:conf/sacmat/ByunBL05
fatcat:obqqz5woovc4xkgnzho2aybtzm
Welcome Message from the General Chair
2006
International Conference on Dependable Systems and Networks (DSN'06)
results and practical experiences among members of the international Databases community. ...
The conference was a huge success for its time, attracting almost 100 papers and more than 150 participants. We have come a long way since then! ...
compiled similar guides for ICSE 2001 and RE 2001, respectively ...
doi:10.1109/dsn.2006.75
dblp:conf/dsn/X06
fatcat:k4duddvbk5glboxkqxkkfsh4p4
Secure personal data servers
2010
Proceedings of the VLDB Endowment
By embedding a full-fledged Personal Data Server in such devices, user control of how her sensitive data is shared by others (by whom, for how long, according to which rule, for which purpose) can be fully ...
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. ...
Acknowledgments: The authors wish to thank Anne Canteaut and Philippe Bonnet for their helpful comments on this paper. ...
doi:10.14778/1920841.1920850
fatcat:tab7ustvajeqbgewqin4oaayzy
« Previous
Showing results 1 — 15 out of 72 results